Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

According to GEODI can mask or anonymize files or databases based on discovery results.

Masking means blacking out sensitive data, and anonymization means replacing data with fake but real-looking ones. Both functions allow you to share content with less concern. Masking hides sensitive information, and you can identify whether a document is masked. But anonymization creates a completely real-looking version of the content. Anonymization is more suitable for testing or data scientists.

There are some masking options.

...

Change with a simple character, like **

...

discovery results, masking or anonymization can be applied to files and databases.

Table of Contents
stylenone

Masking refers to obscuring sensitive data in a content or replacing it with a fixed text. On the other hand, anonymization involves replacing a value with other values that appear real.

With masking, sensitive data is completely obscured, while anonymization breaks the link with real data but still maintains the appearance of real data. By anonymizing data containing sensitive information, you can easily share it with testing teams, data analysis teams, or researchers.

How the findings should be masked can be determined.

  1. You can replace it with *.

  2. You can replace a name or phone number with a distinct value such as [NAME] or [TELNO]First 2, last four char of an IBAN or CreditCard.

  3. You can use the first two and last four characters for identifiers like IBAN or credit card numbers.

  4. Cases like capitalizing the first letter are possible.

(info) Content names (File names, e-mail subjects, ..) are not masked.

Info

Masking chocies

  • Persistent File Masking: Selected files are masked/anonimized persistently. Keeping the original values is a choice. You may choose to replace all findings, PII or just financial values.

  • Dynamic Masking: Dynamic option allows you to set visibility of sensitive i,nformation by permissons. Same content (a PF, word , ..) looks different to different users based on permissions.

  • Database Masking: It is possible to mask/animiyze

    can be done in several ways.

    1. Permanent File Masking: In file-based data, discovery layers identified as permanent or copy can be altered. Rules can be defined separately for personal data, financial data, or all data. A copy document can be created where all identified words with identifiers or dictionaries are hidden. Different masking options may exist for the legal and purchasing departments of the same document.

    2. Dynamic Masking: Discovery layers selected with selected groups/users change dynamically. So, while one user sees the same document in its entirety, another may view it with hidden financial areas or personal data.

    3. Database Masking: It creates a masked or anonymized copy of a given database as the source. It is possible to mask a database for software development teams. This capability should not be confused with products that perform dynamic database masking.

    Persistent File Masking

    GEODI creates a copy of the content undergoing masking to perform the process. The operation functions in the "Mask and Download" manner.

    Note

    You may also use batch masking options on the actions menu. Batch masking allows you to mask thousands of files at the same timecan also perform this process in bulk using the "Batch Mask/Anonymize" action from the Actions menu. Actions create a script that the system administrator should execute. For individual files or a small number of files, you can generate modified copies of the files using the masking/anonymization process within the viewer.

    Info
    • Masking operates in the following formats:

      • Word (*.doc, *.docx, *.rtf)

      • Excel (*.xlsm, *.csv, *.xlsx, *.xls)

      • PDF (*.pdf)

      • Powerpoint (*.ppt, *.pptx, *.ppsx)

      • LibreOffice (*.odp, *.odt, *.ods)

    • In the Access is available for viewers of supported formats for the masking process , access is available under the (info) button.

    • You By creating as many definitions (masking metadata) as needed, you can mask all discovered data or a selected subset by creating as many definitions (Masking Metadata) as needed.

      • By default, the The following definitions are provided . Changes and additions can be made using the by default. The method specified on this page can be used to make changes and additions.

      • For example, with masking, a name like "Hasan Hüseyin" can be masked as "[NAME]" or "****". Different masking formats can be defined based on different identifiers using definitions. This means that names, IBANs, and currency expressions can all be masked differently.

    ...

    • With dynamic masking, the discovery results are masked and visible in on screens such as the viewer, words, network graph, summary, etc., in a masked form.

    • Masking in the viewer applies to the following types, regardless of their source: whether they are embedded in a File Server, SharePoint, or Database.

      • Office Files (Word, Excel, PowerPoint)

      • Open Office (ODT, ODS, ...)

      • PDF

      • TXT, XPS

    • On the last page of the project wizard, the The "Dynamic Masking" box is selected on the project wizard's last page, and settings are configured.

    • Once adjustments are made, files in the project are displayed to users in a masked format.

      • It operates with group-based authorization.

      • A masking metadata is defined for each group.

      • When group members open a file from the project, it is displayed in a masked form according to the defined masking metadata.

    ...

    Database masking performs permanent masking on the given database. If You can also work on a copy if you want the original data to remain intact, you can also work on a copy.

    Database masking provides several use cases:

    1. When you need to share your database with software or testing teams. Masking , masking permanently removes sensitive data from your database for this use case.

    2. When you share your database for data analysis, it permanently removes sensitive data is permanently removed, allowing you to safely share the database safely.

    Permissions

    The permission for masking Masking authorization is the same as the document download permissionauthorization. Those with download permission permissions can use it.

    For dynamic masking. You may also utilize group-based dynamics masking.

    ...

    , authorization can be done based on the user/group or discovery results.

    FAQ

    Expand
    titleKnown Issues for Permanent Masking
    1. Masking may behave differently in the following situations:

      1. Discovery results from multiple columns are not masked.

      2. Masking is not applied in Excel or database records if the cell/column type is numeric. Values such as IBAN or credit card numbers in such columns are detected but not masked.

      3. If the cell/column type is a date in Excel or databases, date values are discovered but not masked.

      4. In Excel/database cells, if a paragraph contains more than one finding, only one is masked. For instance, if a name and an ID number occur in the paragraph, only one will be masked.

    2. Some files (.mobi, .xps) can not be permanently masked, but dynamic masking is possible.

    Expand
    titleLicense Requirement

    A MASKING and DISCOVERY license is required.

    Expand
    titleKnown Issues for Dynamic Masking
    1. Emails are not masked on the viewer, but their attachments are masked according to the defined rules.

    2. Some files (.mobi, .xps) can not be permanently masked, but dynamic masking is possible.

    3. Database (DB) contents appear masked in the DLV interface, but they are shown unmasked in the viewer.